Black Hat Asia 2018:
First Briefings Announced Black Hat Asia returns to Singapore, March 20-23, 2018 with hands-on technical Trainings, cutting-edge Briefings, Arsenal open-source tool demonstrations, top-tier solutions and service providers in the Business Hall, and more.
Black Hat Europe 2017:
New Briefings Announced Final Batch of Black Hat Europe 2017 Briefings Released
Black Hat Europe 2017:
New Briefings Announced We are pleased to announce More Briefings selected for presentation at Black Hat Europe 2017!
Black Hat Europe 2017:
First Briefings Announced We are pleased to announce the first Briefings selected for presentation at Black Hat Europe 2017!
Black Hat USA 2017:
Attendee Survey Results Today, Black Hat releases its third annual research report entitled, Portrait of an Imminent Cyber Threat. Download a copy for actionable insights and information on critical industry trends.
Black Hat USA 2017:
Data Forensices and Incident Response Roadmap Strong data forensics and incident response capabilities are critical for agile breach detection and mitigation. Challenges of multiple access points, the influx of mobile and connected devices and the large amount of resulting data makes this an arduous task. Build these highly sought after skills at Black Hat USA with the Data Forensics and Incident Response track
Black Hat USA 2017:
Predominance of Internet of Things Expected rise in IoT breaches and complexities points to a need for advanced knowledge of IoT practicalities and fundamentals. Navigate the dynamic threat landscape with these Black Hat USA offerings and view the Briefings IoT Track to begin customizing your Black Hat USA experience.
Black Hat USA 2017: 35 New Briefings Announced
We are pleased to announce 35 new Briefings selected for presentation at Black Hat USA 2017!
Black Hat USA 2017:
Security Challenges in the Enterprise Growing costs of incident management and remediation have heightened the need for new breach mitigation strategies and tools. Enterprise systems are particularly susceptible to compromise with unique challenges to risk visibility and assessment. Unobstructed view and comprehensive knowledge of the threat surface is critical to preempting attack vectors and mitigating breach incidents.
Black Hat USA 2017: 15 New Briefings Announced
We are pleased to announce 15 new Briefings selected for presentation at Black Hat USA 2017!
Black Hat Review Board Spotlight:
Beyond the Bio with Jamie Butler Get to know the Black Hat Review Board in a new interview series, Beyond the Bio. In this series, Black Hat Review Board Members offer insight from their favorite exploits and pastimes to their most memorable Black Hat experiences.
Black Hat Asia 2017:
CISOs Must Get Proactive about the Internet of Things These four steps will help reduce the risk from looming IoT attacks
Black Hat Asia 2017:
Pentesting for Vulnerabilities Continually testing for vulnerabilities is critical to threat detection and prevention
Black Hat Asia 2017:
Securing Mobile Devices Opportunities for phishing, ransomware, cryptocurrency mining and other attacks are endless. Understanding mechanisms for compromising Android and iOS systems is crucial to detecting and preventing security breaches.
Black Hat Asia 2017:
Threat & Vulnerability Management: Knowing You’re Secure Threat and vulnerability management is a foundational technique that every security professional should embrace. Here’s why.
Black Hat Europe 2016:
Introducing ‘RegTech:’ Cloud-based Tools For Regulatory Compliance As regulatory requirements grow in volume and complexity in Europe and globally, cloud computing is emerging as a key tool to help companies manage compliance processes.
Black Hat Europe 2016:
How Artificial Intelligence Will Liberate Security The security paradigm is shifting to one of ‘security as a science’ with AI as the primary agent for that revolutionary change.
Black Hat Europe 2016:
The 7 Habits of Highly Effective Security Operations Why cyber analysts spend nearly 75% if their time on false positives, and what to do about it.
Black Hat Europe 2016:
5 Best Practices for Defending Against a Cyberattack The proactive management of cybersecurity relies on an intelligence-led approach that can either prevent a breach from happening, or make sure that it is quickly detected and remediated.
Black Hat Europe 2016:
What’s Next For Ransomware & How To Prevent It Ransomware has existed in various forms for decades, but in the last three years, cybercriminals have perfected its key components. Here’s what you need to know now.
Black Hat Europe 2016:
BooleBox: A New Perspective On Enterprise Data Protection The thought of sensitive data ending up in the wrong hands can keep both IT administrators and top-managers awake at night. As the latest trends show, many organizations are gaining more and more awareness about the various existing threats to their intellectual property and confidential information.
Black Hat Europe 2016 Sponsor Content:
What’s In Your Armoury For Discovering Software Vulnerabilities? The process of locating, identifying and targeting software vulnerabilities has changed beyond measure in the last 20 years. Automated tools are a huge factor in this and have made the whole process a lot easier, yet subtle and esoteric weaknesses are beginning to creep into software – and they aren’t easy to spot.
It´s Time For Legacy AV To Leave The Building: #legxit
[Black Hat Europe 2016 Sponsor Content: SentinelOne]
Ransomware Rages On
[Black Hat Europe 2016 Sponsor Content: iboss Cybersecurity]
Black Hat Europe 2016: Penetration Testing is Key in Enhancing Your Security
Last year, 594 million people were affected by cybercrime around the world (according to Norton Cybersecurity Insights Report). Cyber attacks will only become more sophisticated in the years to come. As the severity of online attacks continue to escalate, it is critical to find ways to mitigate potential exploits. Penetration testing is a great method of detecting vulnerabilities in your systems or devices and we’ve highlighted a few Black Hat Trainings that can truly enhance your skills.
Black Hat USA 2016: Beware of Malware
Over 430 million new pieces of malware were discovered last year, a 36% increase from the previous year (according to Symantec). Malware attacks are projected to rise in volume and frequency. Hackers are becoming more skilled at detecting vulnerabilities and commonly use malware as their method of attack. It is critical to be aware of the current malware threats and learn how you can defuse potential exploits.
Black Hat USA 2016: Windows Security
Microsoft’s Windows dominates the OS landscape, accounting for 89% of the market (according to Hot Hardware), and the latest Windows upgrade, Windows 10, is now running on 300 million active devices worldwide (reported by Microsoft). Being the leader in the space also makes Windows a huge target for hackers who constantly scan for vulnerabilities in the system.
Black Hat USA 2016: Digital Communication Security
In a global population of 7.395 billion people, 3.419 billion people are internet users and of those, 2.307 billion people communicate via social media (according to the study “Digital in 2016” by We Are Social). Since a large portion of the world’s population communicates using the internet, cyber security is a priority for users.
Black Hat USA 2016: Mobile Hacking
Over 1.4 billion people across the world are using Android devices, according to Google. Unlike Apple’s iOS, Android is not tied to a specific manufacturer, allowing it to account for 81.6% of the smartphone operating system market (Statistica). However, since Android dominates the smartphone market, it presents an ideal opportunity for hackers to tap into a large base of user information. It’s essential for Android users, as well as iOS users, to learn how to protect themselves.
Black Hat USA 2016: Locking Down Your Platform Security
Only 38% of international organizations reveal they feel prepared to handle a sophisticated cyberattack, according to ISACA International (2015 Global Cybersecurity Status Report). The refinement of hacking technology is continuously evolving and learning how to heighten your security measures is critical. Not taking an active role in improving platform security could put your company’s proprietary information at risk.
Black Hat Europe 2015: Just the Attacks, Ma'am
Allow us to channel an early 2000, sweating, hyperkinetic Steve Ballmer: exploits, exploits, exploits, exploits! Today's Black Hat Europe 2015 Briefing highlights are all about novel and sometimes devastating new attacks against systems of all kinds. Can they get you as pumped up as Steve? Let's find out.
Black Hat Europe 2015: Gaps in the Corporate Armor
In today's Intel Update, we're going big... enterprise big, with a selection of Black Hat Europe 2015 Briefing highlights that focus on vulnerabilities affecting large organizations. Few targets are more tempting to criminals (or have more to lose) so let's take a peek at a few promisingly tender spots tucked behind corporate veils.
Black Hat Europe 2015: The Best Response
Forensics and incident response: two disciplines in ever-higher demand in today's world of subtle intrusions and stealthy attacks. This trio of Black Hat Europe 2015 Briefings highlights grapple with different aspects of the art of intelligent counter-intelligence.
Black Hat Europe 2015: Cracking Crypto
It's largely thanks to the hard work of decades of cryptographers that we're able to keep so much sensitive data safe, secret, and secure. But today's Black Hat Europe 2015 Briefing highlights remind that no crypto scheme's unbeatable, showcasing a variety of attacks with the potential to lay bare important secrets.
Black Hat Europe 2015: Ready to Play Defense?
Implementing a strong defensive posture might not garner much overt recognition, but a job well done will let you sleep well, knowing the crown jewels are safely out of reach of most intruders. Today's trio of Black Hat Europe 2015 Briefings all focus on closing loopholes and hardening systems, all the better for getting that 7.5 hours of sleep doctors keep harping on.
Black Hat Europe 2015: 4 Days Left for Early Bird Rates
Come November, Black Hat, the premier conference on information security, will return to Amsterdam for Black Hat Europe 2015. Some of the industry's brightest minds will deliver two days of Black Hat's signature Briefings and two days of cutting-edge Trainings to bring you up to speed on a diverse range of intriguing and timely InfoSec research. In today's inaugural Black Hat Europe intel update, we'll check out nine diverse Briefings.
Black Hat USA 2015: Breaking Windows
It wouldn't be a proper Black Hat event without a host of interesting new exploits for Microsoft's widely used operating systems, so here are four Black Hat USA 2015 Briefings that will teach you how to break Windows in fresh new ways.
Black Hat USA 2015: Let's Get Physical
It's tempting to think of InfoSec purely in virtual terms, as electrons flowing through circuits and logic gates. But these microscopic events can affect the human-scale physical world, and unexpected physical interventions can also break seemingly secure micro-systems. Today's trio of Black Hat USA 2015 Briefings all demonstrate how this street runs both ways.
Black Hat USA 2015: Border Patrol
Border Gateway Protocol (BGP) is the fabric of routing on the Internet today, with a approximately half a million routes between 50,000 autonomous systems. Sounds like a ripe target for malicious parties to exploit, which is the gist of today's trio of Black Hat Briefing highlights.
Black Hat USA 2015: The Hard Stuff
Software gets much of the hacking spotlight, perhaps understandably so. But the physical infrastructure that runs all that code is just as susceptible to messing with, though it takes a different set of knowledge and techniques. Today's Training trio touch on the more solid side of that divide.
Black Hat USA 2015: Exploit Dev Story
Exploits don't just materialize out of thin air: Finding them is often a huge challenge in itself. Today's Black Hat USA 2015 Trainings all focus on helping you find the weak points in complicated systems, all the better to exploit them.
Black Hat USA 2015: Briefings Begin
You know a Black Hat event is, if not quite imminent, at least on the horizon when we start rolling out intel updates for our Briefings. Briefings are the world-class, widely diverse, super-fresh tech presentations our shows are famous for. And intel updates? You're in one. Our first topic is one we've seen a lot in the news lately: the capacity for computers to learn.
Black Hat USA 2015: Best of the Rest
Today's Black Hat USA 2015 Training update has a little bit of everything, a quartet of intriguing Trainings that didn't quite fit in elsewhere. Spoiler: You're gonna build a drone!
Black Hat USA 2015: Digital Detectives
Was someone here? What did they do? And are they still doing it? If you can't routinely answer those questions, your computer infrastructure is at risk. Forensics is the art of filling in those answers, pointing the way toward an effective response and hopefully better defenses in the future, and is the focus of today's trio of Black Hat USA 2015 Trainings.
Black Hat USA 2015: Two for One
Malware and Crypto are our topics today, and we've got two hot Black Hat USA 2015 Trainings in each to cover. So without further ado...
Black Hat USA 2015: Secret Systems
Supervisory control and data acquisition (SCADA) systems keep the world's vital systems running smoothly, until they don't, which is the only time most people become aware of these crucial embedded systems. Today's trio of Black Hat USA 2015 Trainings will carry you well beyond awareness, taking you on a deep dive into the little-known yet high-stakes world of SCADA security testing.
Black Hat USA 2015: Targeted Attacks
Many Black Hat Trainings teach generalized techniques applicable to many domains, but today we're highlighting three Black Hat USA 2015 Trainings that will focus on exploiting specific operating systems.
Black Hat USA 2015: Pentesting: The Final Tier
In case Black Hat USA 2015's beginner-level and intermediate-level penetration test programming seemed unsuited to your skill level, today we present our final tier of penetration testing trainings. If these advanced courses don't raise an eyebrow, well, maybe you should be teaching one, too.
|